(Last Updated On: 2007年2月15日)Firefox 2.0にNullバイト攻撃の可能性、よくあるバイナリセーフ/非バイナリセーフの問題ですが… https://bugzilla.mozilla.org/show_bug.cgi?id=370445 The problem lies in how Firefox handles writes to the ‘location.hostname’ DOM property. It is possible for a script to set it to values that would not otherwise be accepted as a hostname when parsing a regular URL – including a string containing \x00. 実験ページ http://